Proof-Of-Stake Consensus Mechanisms For Future Blockchain Networks: Fundamentals, Applications and Opportunities
Proof-Of-Stake Consensus Mechanisms For Future Blockchain Networks: Fundamentals, Applications and Opportunities
S.RAGHUNANDAN REDDY
III B.TECH (CSSE-B)
PROOF-OF-STAKE
CONSENSUS MECHANISMS
FOR FUTURE BLOCKCHAIN
NETWORKS:
FUNDAMENTALS,
APPLICATIONS AND
OPPORTUNITIES
ABSTRACT
The rapid development of blockchain technology and their numerous
The formation of stake pools and their effects on the network stake
distribution are also analyzed and simulated. The results show that the ratio
between the block reward and the total network stake has a significant impact
decentralization. You can also think of it as a chain or records stored in the forms
ledger that is completely open to any and everyone on the network. Once an
Each transaction on a blockchain is secured with a digital signature that proves its
authenticity. Due to the use of encryption and digital signatures, the data stored on
digitally and has a common history which is available for all the network
money to your friend who lives in a different location. A general option that you
can normally use can be a bank or via a payment transfer application like PayPal
or Paytm. This option involves third parties in order to process the transaction
Moreover, in cases like these, you cannot ensure the security of your money as it
is highly possible that a hacker might disrupt the network and steal your money.
In both the cases, it is the customer who suffers. This is where Blockchain comes
in.
cases, the process becomes much easier and secure. There is no extra fee involved
as the funds are directly processed by you thus, eliminating the need for a third
party. Moreover, the blockchain database is decentralised and is not limited to any
single location meaning that all the information and records kept on the
blockchain are public and decentralized. Since the information is not stored in a
discovered earlier, the first successful and popular application of the Blockchain
technology came into being in the year 2009 by Satoshi Nakamoto. He created the
first digital cryptocurrency called Bitcoin through the use of Blockchain
technology.
Each block in a blockchain network stores some information along with the hash of
While transactions take place on a blockchain, there are nodes on the network that
validate these transactions. In Bitcoin blockchain, these nodes are called as miners
and they use the concept of proof-of-work in order to process and validate
transactions on the network. In order for a transaction to be valid, each block must
refer to the hash of its preceding block. The transaction will take place only and
only if the hash is correct. If a hacker tries to attack the network and change
information of any specific block, the hash attached to the block will also get
modified.
The breach will be detected as the modified hash will not match with the original
one. This ensures that the blockchain is unalterable as if any change which is made
to the chain of blocks will be reflected throughout the entire network and will be
detected easily.
While making a
transfer, the sender
uses their private key Upon solving the
A blockchain network and announces the puzzle first, the miner
makes use of public transaction information receives rewards in the
and private keys in over the network. A form of bitcoins. Such
order to form a digital block is created kind of problems is
signature ensuring containing information referred to as proof-of-
security and consent. such as digital work mathematical
signature, timestamp, problems.
and the receiver’s
public key.
Decentralised
holds the authority of the overall network. While everybody in the network has
the copy of the distributed ledger with them, no one can modify it on his or her
own. This unique feature of blockchain allows transparency and security while
Peer-to-Peer Network
With the use of Blockchain, the interaction between two parties through a peer-to-
peer model is easily accomplished without the requirement of any third party.
Blockchain uses P2P protocol which allows all the network participants to hold an
For example, if you wish to make any transaction from one part of the world to
another, you can do that with blockchain all by yourself within a few seconds.
Moreover, any interruptions or extra charges will not be deducted in the transfer.
Immutable
The immutability property of a blockchain refers to the fact that any data once
people, you cannot take it back. In order to find a way around, you’ll have to ask
all the recipients to delete your email which is pretty tedious. This is how
immutability works.
Once the data has been processed, it cannot be altered or changed. In case of
the blockchain, if you try to change the data of one block, you’ll have to change
the entire blockchain following it as each block stores the hash of its preceding
block. Change in one hash will lead to change in all the following hashes. It is
extremely complicated for someone to change all the hashes as it requires a lot
Tamper-Proof
any change in even one single block can be detected and addressed smoothly.
There are two keyways of detecting tampering namely, hashes and blocks.
As described earlier, each hash function associated with a block is unique. You
can consider it like a fingerprint of a block. Any change in the data will lead to
a change in the hash function. Since the hash function of one block is linked to
next block, inorder for a hacker to make any changes, he/she will have to
change hashes of all the blocks after that block which is quite difficult to do.
BLOCK CHAINS CAN BE CLASSIFIED MAJORLY
networks.
All the participants of the network maintain the copy of the shared
The rules for immutability and safety of the ledger are decided and
accessed by any and everyone. Anyone with the access to the internet is eligible to
download and access it. Moreover, one can also check the overall history of the
blockchain along with making any transactions through it. Public blockchains
usually reward their network participants for performing the mining process and
is that it can be compromised if the rules around it are not executed strictly.
Moreover, the rules decided and applied initially have very little scope of
shared only among the trusted participants. The overall control of the network
is in the hands of the owners. Moreover, the rules of a private blockchain can
private blockchains.
ALGORITHMS TO VALIDATE THE
TRANSACTIONS IN BLOCK CHAIN
1. Proof of Work
2. Proof of Stake
Power Of Work
Power of Stake
Proof Of
Work
BREAKING POINT
Needs computing power i.e. high electricity usage
Higher Rewards are given to people with better and more equipments:
Process Integrity
Due to the security reasons, this program was made in such a way that any block
or even a transaction that adds to the chain cannot be edited which ultimately
provides a very high range of security.
Traceability
The format of Blockchain designs in such a way that it can easily locate any
problem and correct if there is any. It also creates an irreversible audit trail.
Security
Blockchain technology is highly secure because of the reason each and every
individual who enters into the Blockchain network is provided with a unique
identity which is linked to his account. This ensures that the owner of the account
himself is operating the transactions. The block encryption in the chain makes it
tougher for any hacker to disturb the traditional setup of the chain
Faster processing
Before the invention of the blockchain, the traditional banking organization take a
lot of time in processing and initiating the transaction but after the blockchain
technology speed of the transaction increased to a very high extent. Before this,
the overall banking process takes around three days to settle but after the
introduction of Blockchain, the time reduced to nearly minutes or even seconds.
DEMERITS
Power Use
particular year the power consumption of Bitcoin miners was alone more than
the per capita power consumption of 159 individual countries. Keeping a real-
time ledger is one of the reasons for this consumption because every time it
creates a new node, it communicates with each and every other node at the
same time.
Cost
and most of this cost cover by the energy consumption. There are very fewer
chances that this issue we can resolve by the advancement in the technology.
As the other factor that is the storage problem might be covered by the energy
In each and every part of world modern money has been created and